Your message dated Fri, 14 Oct 2005 05:02:08 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#333734: fixed in curl 7.15.0-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 13 Oct 2005 13:03:01 +0000
>From [EMAIL PROTECTED] Thu Oct 13 06:03:01 2005
Return-path: <[EMAIL PROTECTED]>
Received: from (vserver151.vserver151.serverflex.de) [193.22.164.111] 
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1EQ2jd-0007PT-00; Thu, 13 Oct 2005 06:03:01 -0700
Received: from wlan-client-003.informatik.uni-bremen.de ([134.102.116.4] 
helo=localhost.localdomain)
        by vserver151.vserver151.serverflex.de with esmtpsa 
(TLS-1.0:RSA_AES_256_CBC_SHA:32)
        (Exim 4.50)
        id 1EQ2jY-0004SF-0g
        for [EMAIL PROTECTED]; Thu, 13 Oct 2005 15:02:56 +0200
Received: from jmm by localhost.localdomain with local (Exim 4.54)
        id 1EQ2kI-0004qE-KB; Thu, 13 Oct 2005 15:03:42 +0200
Content-Type: multipart/mixed; boundary="===============1069176351=="
MIME-Version: 1.0
From: Moritz Muehlenhoff <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: curl: Buffer overflow in NTLM authentication
X-Mailer: reportbug 3.17
Date: Thu, 13 Oct 2005 15:03:42 +0200
X-Debbugs-Cc: Debian Security Team <[EMAIL PROTECTED]>
Message-Id: <[EMAIL PROTECTED]>
X-SA-Exim-Connect-IP: 134.102.116.4
X-SA-Exim-Mail-From: [EMAIL PROTECTED]
X-SA-Exim-Scanned: No (on vserver151.vserver151.serverflex.de); SAEximRunCond 
expanded to false
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
        X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02

This is a multi-part MIME message sent by reportbug.

--===============1069176351==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

Package: curl
Version: 7.14.1-5
Severity: grave
Tags: security
Justification: user security hole

Another buffer overflow has been found in curl's NTLM authentication
code. (This one is different from CAN-2005-0490 and doesn't seem to
have a CVE assignment yet). Please see 
http://www.mail-archive.com/wget%40sunsite.dk/msg08294.html
for more information. The vulnerable code is almost identical
to wget. For your reference I've attached the extracted fix from
the latest wget release. The actual fix applies to curl's
Curl_output_ntlm() function as well, but needs to be adapted to
the appropriate CURLcode definition for an error situation like
this instead of returning NULL.

Cheers,
        Moritz

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.14-rc1
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages curl depends on:
ii  libc6                         2.3.5-6    GNU C Library: Shared libraries an
ii  libcomerr2                    1.38-2     common error description library
ii  libcurl3                      7.14.1-5   Multi-protocol file transfer libra
ii  libidn11                      0.5.18-1   GNU libidn library, implementation
ii  libkrb53                      1.3.6-5    MIT Kerberos runtime libraries
ii  libssl0.9.8                   0.9.8-2    SSL shared libraries
ii  zlib1g                        1:1.2.3-4  compression library - runtime

curl recommends no packages.

-- no debconf information

--===============1069176351==
Content-Type: text/x-c; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="wget-ntlm-auth-bufferoverflow.diff"

diff -Naur wget-1.10.1/src/http-ntlm.c wget-1.10.2/src/http-ntlm.c
--- wget-1.10.1/src/http-ntlm.c 2005-05-10 23:16:53.000000000 +0200
+++ wget-1.10.2/src/http-ntlm.c 2005-10-13 10:52:21.000000000 +0200
@@ -526,6 +526,11 @@
     size=64;
     ntlmbuf[62]=ntlmbuf[63]=0;
 
+    /* Make sure that the user and domain strings fit in the target buffer
+       before we copy them there. */
+    if(size + userlen + domlen >= sizeof(ntlmbuf))
+      return NULL;
+    
     memcpy(&ntlmbuf[size], domain, domlen);
     size += domlen;


--===============1069176351==--

---------------------------------------
Received: (at 333734-close) by bugs.debian.org; 14 Oct 2005 12:08:36 +0000
>From [EMAIL PROTECTED] Fri Oct 14 05:08:36 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
        id 1EQOGG-0000zk-00; Fri, 14 Oct 2005 05:02:08 -0700
From: Domenico Andreoli <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#333734: fixed in curl 7.15.0-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Fri, 14 Oct 2005 05:02:08 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 3

Source: curl
Source-Version: 7.15.0-1

We believe that the bug you reported is fixed in the latest version of
curl, which is due to be installed in the Debian FTP archive:

curl_7.15.0-1.diff.gz
  to pool/main/c/curl/curl_7.15.0-1.diff.gz
curl_7.15.0-1.dsc
  to pool/main/c/curl/curl_7.15.0-1.dsc
curl_7.15.0-1_i386.deb
  to pool/main/c/curl/curl_7.15.0-1_i386.deb
curl_7.15.0.orig.tar.gz
  to pool/main/c/curl/curl_7.15.0.orig.tar.gz
libcurl3-dbg_7.15.0-1_i386.deb
  to pool/main/c/curl/libcurl3-dbg_7.15.0-1_i386.deb
libcurl3-gnutls-dev_7.15.0-1_i386.deb
  to pool/main/c/curl/libcurl3-gnutls-dev_7.15.0-1_i386.deb
libcurl3-gnutls_7.15.0-1_i386.deb
  to pool/main/c/curl/libcurl3-gnutls_7.15.0-1_i386.deb
libcurl3-openssl-dev_7.15.0-1_i386.deb
  to pool/main/c/curl/libcurl3-openssl-dev_7.15.0-1_i386.deb
libcurl3_7.15.0-1_i386.deb
  to pool/main/c/curl/libcurl3_7.15.0-1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Domenico Andreoli <[EMAIL PROTECTED]> (supplier of updated curl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 14 Oct 2005 13:32:06 +0200
Source: curl
Binary: libcurl3-dbg libcurl3 libcurl3-gnutls-dev libcurl3-openssl-dev 
libcurl3-gnutls curl
Architecture: source i386
Version: 7.15.0-1
Distribution: unstable
Urgency: low
Maintainer: Domenico Andreoli <[EMAIL PROTECTED]>
Changed-By: Domenico Andreoli <[EMAIL PROTECTED]>
Description: 
 curl       - Get a file from an HTTP, HTTPS, FTP or GOPHER server
 libcurl3   - Multi-protocol file transfer library
 libcurl3-dbg - libcurl compiled with debug symbols
 libcurl3-gnutls - Multi-protocol file transfer library
 libcurl3-gnutls-dev - Development files and documentation for libcurl
 libcurl3-openssl-dev - Development files and documentation for libcurl
Closes: 329313 333609 333734
Changes: 
 curl (7.15.0-1) unstable; urgency=low
 .
   * New upstream release:
     - fixed user+domain name buffer overflow in the NTLM code
       (CAN-2005-3185, closes: #333734).
     - libcurl3-*-dev packages now depend on libkrb5-dev (closes: #333609).
     - improved docs about curl_easy_setopt() and ERRORBUFFER (closes: #329313).
Files: 
 7e9ef85b93c465bfa05a46f18aa6fb11 915 web optional curl_7.15.0-1.dsc
 02bd72f1458c0cc802b33808fd0afe75 1751006 web optional curl_7.15.0.orig.tar.gz
 85b80928ff566c773e23dbe4a1b7f071 181051 web optional curl_7.15.0-1.diff.gz
 d77e7d65b8c0279cc205ade400d6b2e2 162012 web optional curl_7.15.0-1_i386.deb
 7b9f98f23a13a82ae477a01b4202483d 159984 libs optional 
libcurl3_7.15.0-1_i386.deb
 8e36ba8d519df07cebc79c859c3d57a9 154400 libs optional 
libcurl3-gnutls_7.15.0-1_i386.deb
 cf7d6d6a8e1cc711c0c7e42c784ad625 702364 libdevel optional 
libcurl3-openssl-dev_7.15.0-1_i386.deb
 27e16eb5d4f38171aa900548fb69b926 696068 libdevel optional 
libcurl3-gnutls-dev_7.15.0-1_i386.deb
 e5d8b60997cf1ca788d8d84a6f85de69 502602 libdevel extra 
libcurl3-dbg_7.15.0-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDT5s6BneQM6IOvFARAorKAJ90ShAwY2t9iQljfrXIMRXj08Lf2gCfRMPc
wF5hEaspfg2SscxHEhx1q6U=
=pMqK
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to